Pass the Paloalto Networks Network Security Administrator NGFW-Engineer Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which two zone types are valid when configuring a new security zone? (Choose two.)

Options:

A.

Tunnel


B.

Intrazone


C.

Internal


D.

Virtual Wire


Questions # 12:

A PA-Series firewall with all licensable features is being installed. The customer’s Security policy requires that users do not directly access websites. Instead, a security device must create the connection, and there must be authentication back to the Active Directory servers for all sessions.

Which action meets the requirements in this scenario?

Options:

A.

Deploy the transparent proxy with Web Cache Communications Protocol (WCCP).


B.

Deploy the Next-Generation Firewalls as normal and install the User-ID agent.


C.

Deploy the Advanced URL Filtering license and captive portal.


D.

Deploy the explicit proxy with Kerberos authentication scheme.


Questions # 13:

How does a Palo Alto Networks NGFW respond when the preemptive hold time is set to 0 minutes during configuration of route monitoring?

Options:

A.

It does not accept the configuration.


B.

It accepts the configuration but throws a warning message.


C.

It removes the static route because 0 is a NULL value


D.

It reinstalls the route into the routing information base (RIB) as soon as the path comes up.


Questions # 14:

What is the purpose of assigning an Admin Role Profile to a user in a Palo Alto Networks NGFW?

Options:

A.

Allow access to all resources without restrictions.


B.

Enable multi-factor authentication (MFA) for administrator access.


C.

Define granular permissions for management tasks.


D.

Restrict access to sensitive report data.


Questions # 15:

Which set of options is available for detailed logs when building a custom report on a Palo Alto Networks NGFW?

Options:

A.

Traffic, User-ID, URL


B.

Traffic, threat, data filtering, User-ID


C.

GlobalProtect, traffic, application statistics


D.

Threat, GlobalProtect, application statistics, WildFire submissions


Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions